Wissenschaftliche Artikel

Eckhart, M., Ekelhart, A., Biffl, S., Lüder, A., & Weippl, E. R. (2022). QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2022.3193119 ( reposiTUm)
Eckhart, M., Ekelhart, A., & Weippl, E. (2020). Automated Security Risk Identification Using AutomationML-based Engineering Data. IEEE Transactions on Dependable and Secure Computing, 19(3), 1655–1672. https://doi.org/10.1109/tdsc.2020.3033150 ( reposiTUm)
Eckhart, M., Brenner, B., Ekelhart, A., & Weippl, E. (2019). Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. Journal of Internet Services and Information Security, 9(3), 52–73. https://doi.org/10.22667/JISIS.2019.08.31.052 ( reposiTUm)
Wenzl, M., Merzdovnik, G., Ullrich, J. M. M., & Weippl, E. (2019). From Hack to Elaborate Technique—A Survey on Binary Rewriting. ACM Computing Surveys, 52(3), 1–37. https://doi.org/10.1145/3316415 ( reposiTUm)
Dabrowski, A., Ullrich, J., & Weippl, E. R. (2018). Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid. Elektrotechnik Und Informationstechnik : E & i, 135(3), 250–255. https://doi.org/10.1007/s00502-018-0618-3 ( reposiTUm)
Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., & Pöpper, C. (2018). On Security Research Towards Future Mobile Network Generations. IEEE Communications Surveys and Tutorials, 20(3), 2518–2542. https://doi.org/10.1109/comst.2018.2820728 ( reposiTUm)
Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010 ( reposiTUm)
Ullrich, J., Zseby, T., Fabini, J., & Weippl, E. (2017). Network-Based Secret Communication in Clouds: A Survey. IEEE Communications Surveys and Tutorials, 19(2), 1112–1144. https://doi.org/10.1109/comst.2017.2659646 ( reposiTUm)
Islam, S., Fenz, S., Weippl, E., & Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners. International Journal of Secure Software Engineering, 7(3), 44–73. https://doi.org/10.4018/ijsse.2016070103 ( reposiTUm)
Ismail, U. M., Islam, S., Ouedraogo, M., & Weippl, E. (2016). A Framework for Security Transparency in Cloud Computing. Future Internet, 8(1). http://hdl.handle.net/20.500.12708/150120 ( reposiTUm)
Neuner, S., Schmiedecker, M., & Weippl, E. (2016). Effectiveness of file‐based deduplication in digital forensics. Security and Communication Networks, 9(15), 2876–2885. http://hdl.handle.net/20.500.12708/150121 ( reposiTUm)
Ullrich, J., Cropper, J., Frühwirt, P., & Weippl, E. (2016). The and security of firewalls in cyber-physical cloud computing. EURASIP Journal on Information Security, 2016:18(18). http://hdl.handle.net/20.500.12708/150117 ( reposiTUm)
Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G., & Weippl, E. (2016). Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Computing Surveys, 49(1), 1–37. https://doi.org/10.1145/2886012 ( reposiTUm)
Kieseberg, P., Malle, B., Frühwirt, P., Holzinger, A., & Weippl, E. (2016). A tamper-proof audit and control system for the doctor in the loop. Brain Informatics, 3(4), 269–279. http://hdl.handle.net/20.500.12708/150119 ( reposiTUm)
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005 ( reposiTUm)
Frühwirt, P., Kieseberg, P., Krombholz, K., & Weippl, E. (2014). Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digital Investigation, 11(4), 336–348. http://hdl.handle.net/20.500.12708/157885 ( reposiTUm)
Hochreiner, C., Frühwirt, P., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Genie in a Model? Why Model Driven Security will not secure your Web Application. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(3), 44–62. http://hdl.handle.net/20.500.12708/157875 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electronic Markets, 24(2), 113–124. https://doi.org/10.1007/s12525-014-0154-x ( reposiTUm)
Krieg, C., Dabrowski, A., Hobel, H., Krombholz, K., & Weippl, E. (2013). Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, 4(2), 1–115. https://doi.org/10.2200/s00530ed1v01y201308spt006 ( reposiTUm)
Anjomshoaa, A., Khue, V. S., Tahamtan, A., Tjoa, A. M., & Weippl, E. (2012). Self-Monitoring in Social Networks. International Journal of Intelligent Information and Database Systems, 6(4), 363. https://doi.org/10.1504/ijiids.2012.049110 ( reposiTUm)
Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Computing, SPECIAL ISSUE ON SECURITY AND PRIVACY IN SOCIAL NETWORKS. http://hdl.handle.net/20.500.12708/162843 ( reposiTUm)
Schwarzl, C., & Weippl, E. (2011). A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. International Journal of Secure Software Engineering, 2(1), 40–83. https://doi.org/10.4018/jsse.2011010103 ( reposiTUm)
Mulazzani, M., Huber, M., & Weippl, E. (2010). Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(5), 539–546. http://hdl.handle.net/20.500.12708/166270 ( reposiTUm)
Neubauer, Th., Heurix, J., Min Tjoa, A., & Weippl, E. R. (2010). Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotechnik und Informationstechnik : e & i, 127(5), 135–142. https://doi.org/10.1007/s00502-010-0733-2 ( reposiTUm)
Asfand-E-Yar, M., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). Exploiting Ontology for Software License Agreements. International Journal of Software and Informatics, 4(1), 89–100. http://hdl.handle.net/20.500.12708/167084 ( reposiTUm)
Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems. Interaction Design and Architecture(s) Journal, 9–10, 85–103. http://hdl.handle.net/20.500.12708/168194 ( reposiTUm)
Tabatabai Irani, M., & Weippl, E. (2009). Automation Of Post-Exploitation. International Journal of Web Information Systems (IJWIS), 5(4), 518–536. http://hdl.handle.net/20.500.12708/166271 ( reposiTUm)
Weippl, E. (2008). Cyber Attacks and the article 5 of the Treaty of NATO. Euro Atlantic Quartely, 3(4), 22. http://hdl.handle.net/20.500.12708/171290 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763 ( reposiTUm)
Weippl, E. (2007). Dependability in e-assessment. International Journal on E-Learning: Corporate, Government, Healthcare & Higher Education, 6(2), 293–302. http://hdl.handle.net/20.500.12708/169623 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637 ( reposiTUm)
Weippl, E. (2006). Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure. Information Systems Control Journal, 4(10). http://hdl.handle.net/20.500.12708/173392 ( reposiTUm)
Weippl, E., & Tjoa, A. M. (2006). Security Aspects of Ubiquitious Computing in Health Care. Elektrotechnik Und Informationstechnik, 123(4), 156–161. http://hdl.handle.net/20.500.12708/173391 ( reposiTUm)
Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: Anonymity, pseudonyms and authenticated usage. Interactive Technology and Smart Education (ITSE), 2005(2), 247–256. http://hdl.handle.net/20.500.12708/173359 ( reposiTUm)
Weippl, E. (2005). Security in e-learning. ACM ELearn, 2005, 3. http://hdl.handle.net/20.500.12708/173360 ( reposiTUm)
Nguyen, M. T., Tjoa, A. M., Weippl, E., & Brezany, P. (2005). Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing. International Journal of Data Warehousing and Mining, IDEA GROUP(Vol. 1-4), 22–55. http://hdl.handle.net/20.500.12708/173340 ( reposiTUm)

Beiträge in Tagungsbänden

Kieseberg, P., Weippl, E., Tjoa, A. M., Cabitza, F., Campagner, A., & Holzinger, A. (2023). Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? In A. Holzinger, P. Kieseberg, & F. Cabitza (Eds.), Machine Learning and Knowledge Extraction : 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 – September 1, 2023, Proceedings (pp. 1–12). Springer. https://doi.org/10.1007/978-3-031-40837-3_1 ( reposiTUm)
Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2022). How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. In WWW ’22: Companion Proceedings of the Web Conference 2022 (pp. 467–477). ACM. https://doi.org/10.1145/3487553.3524627 ( reposiTUm)
Ghesmati, S., Kern, A., Judmayer, A., Stifter, N., & Weippl, E. (2021). Unnecessary Input Heuristics and PayJoin Transactions. In HCI International 2021 - Posters (pp. 416–424). https://doi.org/10.1007/978-3-030-78642-7_56 ( reposiTUm)
Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 533–549). Springer. https://doi.org/10.1007/978-3-662-63958-0_39 ( reposiTUm)
Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 507–532). Springer. https://doi.org/10.1007/978-3-662-63958-0_38 ( reposiTUm)
Schindler, P., Judmayer, A., Hittmeir, M., Stifter, N., & Weippl, E. (2021). RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. In Proceedings 2021 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium (NDSS) Symposium 2021, Unknown. Internet Society. https://doi.org/10.14722/ndss.2021.24116 ( reposiTUm)
Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021). Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. In Machine Learning and Knowledge Extraction (pp. 1–20). Springer. http://hdl.handle.net/20.500.12708/55662 ( reposiTUm)
Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2020). HydRand: Efficient Continuous Distributed Randomness. In 2020 IEEE Symposium on Security and Privacy (SP). 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, United States of America (the). https://doi.org/10.1109/sp40000.2020.00003 ( reposiTUm)
Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., & Krombholz, K. (2020). User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (pp. 341–358). USENIX Association. http://hdl.handle.net/20.500.12708/153349 ( reposiTUm)
Brenner, B., Ekelhart, A., & Weippl, E. (2019). A versatile Security Layer for AutomationML. In Proceedings of INDIN 2019. 17th IEEE International Conference on Industrial Informatics (INDIN 2019), Helsinki, Finland, EU. IEEE. http://hdl.handle.net/20.500.12708/58078 ( reposiTUm)
Eckhart, M., Ekelhart, A., & Weippl, E. (2019). Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain, EU. IEEE. https://doi.org/10.1109/etfa.2019.8869197 ( reposiTUm)
Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In Passive and Active Measurement (pp. 258–270). Springer, Cham. http://hdl.handle.net/20.500.12708/58117 ( reposiTUm)
Stifter, N., Schindler, P., Judmayer, A., Zamyatin, A., Kern, A., & Weippl, E. (2019). Echoes of the Past: Recovering Blockchain Metrics from Merged mining. In Financial Cryptography and Data Security. 23rd International Conference, FC 2019, St. Kitts, Non-EU. Springer. http://hdl.handle.net/20.500.12708/58072 ( reposiTUm)
Stifter, N., Eckhart, M., Brenner, B., & Weippl, E. (2019). “Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems.” In Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain, EU. IEEE. http://hdl.handle.net/20.500.12708/58103 ( reposiTUm)
Eckhart, M., Ekelhart, A., Lüder, A., Biffl, S., & Weippl, E. (2019). Security Development Lifecycle for Cyber-Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal, Portugal, EU. IEEE. http://hdl.handle.net/20.500.12708/58114 ( reposiTUm)
Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2019). Distributed Key Generation with Ethereum Smart Contracts. In Consumer Identity World EU 2019. Consumer Identity World EU 2019, Amsterdam, Netherland, EU. Springer. http://hdl.handle.net/20.500.12708/58084 ( reposiTUm)
Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in Cyber Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal, Portugal, EU. IEEE. http://hdl.handle.net/20.500.12708/58105 ( reposiTUm)
Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. In IEEE (pp. 3012–3017). IEEE. http://hdl.handle.net/20.500.12708/58116 ( reposiTUm)
Kieseberg, P., & Weippl, E. (2018). Security Challenges in Cyber-Physical Production Systems. In Software Quality: Methods and Tools for Better Software and Systems (pp. 3–16). Springer Lecture Notes in Business Information Processing. http://hdl.handle.net/20.500.12708/57496 ( reposiTUm)
Neuner, S., Voyiatzis, A. G., Fotopoulos, S., Mulliner, C., & Weippl, E. (2018). USBlock: Blocking USB-Based Keypress Injection Attacks. In Data and Applications Security and Privacy XXXII (pp. 278–295). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57497 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., & Weippl, E. (2018). Structural Limitations of B+-Tree forensics. In Proceedings of the Central European Cybersecurity Conference 2018. Central European Cybersecurity Conference 2018, Ljubljana, Slowenia, EU. ACM Digital Library. https://doi.org/10.1145/3277570.3277579 ( reposiTUm)
Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., & Knottenbelt, W. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In Proceedings of Bitcoin 2018. 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort, Non-EU. Sprinter Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57678 ( reposiTUm)
Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., & Weippl, E. (2018). Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. In Research in Attacks, Intrusions, and Defenses (pp. 184–203). Springer in the Lecture Notes in Computer Science series. http://hdl.handle.net/20.500.12708/57447 ( reposiTUm)
Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2018). Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. In Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 197–206). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57491 ( reposiTUm)
Mayer, W., Schreiber, T., & Weippl, E. (2018). A Framework for Monitoring Net Neutrality. In The 13th International Conference on Availability, Reliability and Security (ARES 2018). The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, EU. ACM International Conference Proceeding Series. http://hdl.handle.net/20.500.12708/57445 ( reposiTUm)
Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (2018). Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. In CD-MAKE 2018: Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference (pp. 1–8). Springer. http://hdl.handle.net/20.500.12708/58777 ( reposiTUm)
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2018). Machine Learning and Knowledge Extraction. In Lecture Notes in Computer Science. International Cross-Domain Conference, CD-Make 2018, Hamburg, EU. Sprinter Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-319-99740-7 ( reposiTUm)
Neuner, S., Voyiatzis, A. G., Schmiedecker, M., & Weippl, E. (2017). Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56971 ( reposiTUm)
Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, EU. http://hdl.handle.net/20.500.12708/56974 ( reposiTUm)
Machida, S., Dabrowski, A., Weippl, E., & Echizen, I. (2017). PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. In I3E 2017: Digital Nations - Smart Cities, Innovation, and Sustainability (pp. 261–275). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57198 ( reposiTUm)
Dabrowski, A., Ullrich, J., & Weippl, E. (2017). Grid Shock: Coordinated Load-Changing Attacks on Power Grids. In Proceedings of the 2017 Annual Computer Security Applications Conference. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/57199 ( reposiTUm)
Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A. G., & Weippl, E. (2017). Lightweight Address Hopping for Defending the IPv6 IoT. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56973 ( reposiTUm)
Kieseberg, P., Neuner, S., Schrittwieser, S., Schmiedecker, M., & Weippl, E. (2017). Real-time forensics through endpoint visibility. In Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime. 9th EAI International Conference on Digital Forensics & Cyber Crime, Prague, Czech Republic, EU. LNICST SpringerLink Digital Library. http://hdl.handle.net/20.500.12708/57200 ( reposiTUm)
Krombholz, K., Mayer, W., Mulazzani, M., & Weippl, E. (2017). I Have No Idea What I’m Doing - On the Usability of Deploying HTTPS. In Proceedings of the 26th USENIX Security Symposium. 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, Canada, Canada. http://hdl.handle.net/20.500.12708/56967 ( reposiTUm)
Dabrowski, A., Petzl, G., & Weippl, E. (2016). The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In RAID 2016: Research in Attacks, Intrusions, and Defenses (pp. 279–302). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57202 ( reposiTUm)
Ullrich, J., & Weippl, E. (2016). The beauty or the beast? Attacking rate limits of the xen hypervisor. In Computer Security - ESORICS 2016, Part II (pp. 493–512). http://hdl.handle.net/20.500.12708/57203 ( reposiTUm)
Neuner, S., Mulazzani, M., Schrittwieser, S., & Weippl, E. (2015). Gradually Improving the Forensic Process. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 404–410). IEEE. http://hdl.handle.net/20.500.12708/56235 ( reposiTUm)
Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 327–332). IEEE. http://hdl.handle.net/20.500.12708/56236 ( reposiTUm)
Krombholz, K., Dabrowski, A., Smith, M., & Weippl, E. (2015). Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security FC 2015 International Workshops. 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico, Non-EU. Springer. http://hdl.handle.net/20.500.12708/56198 ( reposiTUm)
Dabrowski, A., Krombholz, K., Weippl, E., & Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In Business Information Systems Workshops - BIS 2015 International Workshops (pp. 235–247). Springer International Publishing. http://hdl.handle.net/20.500.12708/56208 ( reposiTUm)
Dabrowski, A., Echizen, I., & Weippl, E. (2015). Error-Correcting Codes as Source for Decoding Ambiguity. In Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec). 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California, Non-EU. http://hdl.handle.net/20.500.12708/56209 ( reposiTUm)
Ullrich, J., & Weippl, E. (2015). Privacy is Not an Option: Attacking the IPv6 Privacy Extension. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (pp. 448–468). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/56173 ( reposiTUm)
Ullrich, J., Kieseberg, P., Krombholz, K., & Weippl, E. (2015). On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 186–192). IEEE. http://hdl.handle.net/20.500.12708/56202 ( reposiTUm)
Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., & Weippl, E. (2015). QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 230–237). IEEE. http://hdl.handle.net/20.500.12708/56201 ( reposiTUm)
Krombholz, K., Frauenberger, C., & Weippl, E. (2015). Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology. In SOUPS ’15 Full Proceedings. Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada, Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56200 ( reposiTUm)
Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., & Kastner, W. (2015). Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education. 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C., Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56210 ( reposiTUm)
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 79–90). Springer. https://doi.org/10.1007/978-3-319-07620-1_8 ( reposiTUm)
Kadluba, C., Mulazzani, M., Zechner, L., Neuner, S., & Weippl, E. (2014). Windows Installer Security. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55975 ( reposiTUm)
Hudic, A., Krombholz, K., Otterbein, T., Platzer, C., & Weippl, E. (2014). Automated Analysis of Underground Marketplaces. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55966 ( reposiTUm)
Falkner, S., Kieseberg, P., Simos, D. E., Traxler, C., & Weippl, E. (2014). E-voting authentication with QR-codes. In Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 149–159). Springer. http://hdl.handle.net/20.500.12708/56197 ( reposiTUm)
Neuner, S., van der Veen, V., Lindorfer, M., Huber, M., Georg, M., Mulazzani, M., & Weippl, E. (2014). Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). IEEE. http://hdl.handle.net/20.500.12708/55124 ( reposiTUm)
Aufner, P., Merzdovnik, G., Huber, M., & Weippl, E. (2014). Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. In Proceedings of the 7th International Conference on Security of Information and Networks (pp. 434–440). ACM Digital Library. http://hdl.handle.net/20.500.12708/56238 ( reposiTUm)
Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., & Weippl, E. (2014). IPv6 Security: Attacks and Countermeasures in a Nutshell. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) (p. 11). USENIX Association. http://hdl.handle.net/20.500.12708/43399 ( reposiTUm)
Dabrowski, A., Krombholz, K., Ullrich, J., & Weippl, E. (2014). QR - Inception: Barcode in Barcode Attacks. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA, Non-EU. http://hdl.handle.net/20.500.12708/55952 ( reposiTUm)
Beyer, S., Mulazzani, M., Schrittwieser, S., Huber, M., & Weippl, E. (2014). Towards Fully Automated Digital Alibis with Social Interaction. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55965 ( reposiTUm)
Frühwirt, P., Schrittwieser, S., & Weippl, E. (2014). Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55970 ( reposiTUm)
Winter, P., Köwer, R., Mulazzani, M., Huber, M., Schrittwieser, S., Lindskog, S., & Weippl, E. (2014). Spoiled Onions: Exposing Malicious Tor Exit Relays. In Privacy Enhancing Technologies Symposium. Privacy Enhancing Technologies Symposium (PETS), Amsterdam, Netherlands, EU. http://hdl.handle.net/20.500.12708/55959 ( reposiTUm)
Hochreiner, C., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Using Model Driven Security Approaches in Web Application Development. In Asian Conference on Availability, Reliability and Security. AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), Bali, Indonesia, Non-EU. http://hdl.handle.net/20.500.12708/55972 ( reposiTUm)
Frühwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. In GI Sicherheit 2014. GI Sicherheit 2014, Wien, Austria. http://hdl.handle.net/20.500.12708/55951 ( reposiTUm)
Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014). IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/55950 ( reposiTUm)
Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., & Weippl, E. (2014). Towards a Hardware Trojan Detection Cycle. In International Workshop on Emerging Cyberthreats and Countermeasures. International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland, Non-EU. http://hdl.handle.net/20.500.12708/55977 ( reposiTUm)
Kieseberg, P., Hobel, H., Schrittwieser, S., Weippl, E., & Holzinger, A. (2014). Protecting Anonymity in Data-Driven Biomedical Science. In A. Holzinger & I. Jurisica (Eds.), Interactive Knowledge Discovery and Data Mining in Biomedical Informatics (pp. 301–316). Springer-Verlag. https://doi.org/10.1007/978-3-662-43968-5_17 ( reposiTUm)
Schrittwieser, S., Mulazzani, M., Weippl, E., & Panhans, S. (2013). Ethik in der Sicherheitsforschung. In D-A-CH Security 2013. DACH Security 2013, Nürnberg, EU. http://hdl.handle.net/20.500.12708/54988 ( reposiTUm)
Huber, M., Schrittwieser, S., Mulazzani, M., & Weippl, E. (2013). Appinspect: large-scale evaluation of social networking apps. In Proceedings of the first ACM conference on Online social networks (pp. 143–154). http://hdl.handle.net/20.500.12708/54987 ( reposiTUm)
Mulazzani, M., Neuner, S., Schrittwieser, S., Weippl, E., Kieseberg, P., & Huber, M. (2013). Quantifying Windows File Slack in Size and Stability. In Advances in Digital Forensics IX. Springer. http://hdl.handle.net/20.500.12708/54989 ( reposiTUm)
Islam, S., Mouratidis, H., & Weippl, E. (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In Security Engineering for Cloud Computing: Approaches and Tools (pp. 97–122). IGI Global. http://hdl.handle.net/20.500.12708/55063 ( reposiTUm)
Herzberg, A., Shulman, H., Ullrich, J., & Weippl, E. (2013). Cloudoscopy: Services Discovery and Topology Mapping. In Fifth ACM cloud computing security workshop (CCSW 2013) (pp. 113–122). http://hdl.handle.net/20.500.12708/54996 ( reposiTUm)
Mulazzani, M., Weippl, E., Schrittwieser, S., Unger, T., Huber, M., & Frühwirt, D. (2013). SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES). Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, EU. http://hdl.handle.net/20.500.12708/54985 ( reposiTUm)
Schrittwieser, S., Huber, M., Leithner, M., Mulazzani, M., Katzenbeisser, S., Weippl, E., & Kieseberg, P. (2013). Covert Computation - Hiding Code in Code for Obfuscation Purposes. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ASIA CCS ’13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, Non-EU. http://hdl.handle.net/20.500.12708/54990 ( reposiTUm)
Hobel, H., Heurix, J., Anjomshoaa, A., & Weippl, E. (2013). Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. In Security and Privacy Protection in Information Processing Systems (pp. 286–299). Springer-Verlag GmbH. https://doi.org/10.1007/978-3-642-39218-4_22 ( reposiTUm)
Frühwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., & Weippl, E. (2012). InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES) (pp. 625–633). IEEE. http://hdl.handle.net/20.500.12708/54520 ( reposiTUm)
Schrittwieser, S., Kieseberg, P., & Weippl, E. (2012). Digital Forensics for Enterprise Rights Management Systems. In Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services (iiWAS) (p. 10). ACM. http://hdl.handle.net/20.500.12708/54523 ( reposiTUm)
Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2012 (p. 9). The Internet Society. http://hdl.handle.net/20.500.12708/54519 ( reposiTUm)
Mulazzani, M., Schrittwieser, S., Huber, M., Leithner, M., & Weippl, E. (2011). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proceedings of 20th USENIX Security Symposium. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/53926 ( reposiTUm)
Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of 27th Annual Computer Security Applications Conference (ACSAC) (pp. 113–122). http://hdl.handle.net/20.500.12708/53929 ( reposiTUm)
Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., & Weippl, E. (2011). An Algorithm for k-anonymity-based Fingerprinting. In Proceedings of the 10th International Workshop on Digital-forensics and Watermarking. International Workshop on Digital-forensics and Watermarking, Atlantic City, USA, Non-EU. http://hdl.handle.net/20.500.12708/53927 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Morgan, L., Mulazzani, M., Huber, M., & Weippl, E. (2011). Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases. In Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services. IIWAS International Conference on Information Integration, Web-Applications and Services, Yogyakarta Indonesien, Non-EU. http://hdl.handle.net/20.500.12708/53930 ( reposiTUm)
Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., & Weippl, E. (2011). Cloud Speicherdienste als Angriffsvektoren. In Proceedings of 9. Sicherheitskonferenz Krems. Sicherheitskonferenz Krems, Krems, Austria. http://hdl.handle.net/20.500.12708/53931 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Huber, M., & Weippl, E. (2011). Trees Cannot Lie: Using Data Structures for Forensics Purposes. In Proceedings of the European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. http://hdl.handle.net/20.500.12708/53934 ( reposiTUm)
Frühwirth, C., Biffl, S., Schatten, A., Schrittwieser, S., Weippl, E., & Sunindyo, W. D. (2010). Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA) - Work in Progress Session (pp. 1–2). http://hdl.handle.net/20.500.12708/53188 ( reposiTUm)
Fruehwirth, C., Biffl, S., Tabatabai, M., & Weippl, E. (2010). Addressing misalignment between information security metrics and business-driven security objectives. In G. Succi, M. Morisio, & N. Nagappan (Eds.), Proceedings of the 6th International Workshop on Security Measurements and Metrics - MetriSec ’10. https://doi.org/10.1145/1853919.1853927 ( reposiTUm)
Sunindyo, W. D., Biffl, S., Mordinyi, R., Moser, T., Schatten, A., Tabatabai, M., Wahyudin, D., Weippl, E., & Winkler, D. (2010). An event-based empirical process analysis framework. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM ’10. 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010) - Poster Sessions, Bolzano-Bozen, Italy, EU. https://doi.org/10.1145/1852786.1852867 ( reposiTUm)
Sunindyo, W. D., Biffl, S., Frühwirth, C., Mordinyi, R., Moser, T., Schatten, A., Schrittwieser, S., Weippl, E., & Winkler, D. (2010). Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010) - Work in Progress Session (pp. 1–2). COREP Vauban. http://hdl.handle.net/20.500.12708/53214 ( reposiTUm)
Tahamtan, A., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: In Knowledge Science, Engineering & Management (pp. 412–423). Springer. http://hdl.handle.net/20.500.12708/53315 ( reposiTUm)
Huber, M., Mulazzani, M., & Weippl, E. (2010). Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites. In Proceedings of the IFIP International Information Security Conference 2010: Security \& Privacy --- Silver Linings in the Cloud. IFIP International Information Security Conference 2010: Security & Privacy --- Silver Linings in the Cloud, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53518 ( reposiTUm)
Racz, N., Seufert, A., & Weippl, E. (2010). A process model for integrated IT governance, risk, and compliance management. In Proceedings of the Ninth Baltic Conference on Databases and Information Systems (DB&IS 2010) (pp. 155–170). http://hdl.handle.net/20.500.12708/53519 ( reposiTUm)
Racz, N., Panitz, J., Amberg, M., Weippl, E., & Seufert, A. (2010). Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises. In Proceedings of the 21st Australasian Conference on Information Systems (ACIS). ACIS 2010, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53504 ( reposiTUm)
Racz, N., Seufert, A., & Weippl, E. (2010). Questioning the need for separate IT risk management frameworks. In Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Lecture Notes in Informatics (LNI), P-176, Informatik 2010 Proceedings, Band 2. Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Leipzig, EU. Springer LNI. http://hdl.handle.net/20.500.12708/53506 ( reposiTUm)
Farman, A. K., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments. In Proceedings of EDMEDIA 2010. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/53507 ( reposiTUm)
Frühwirt, P., Huber, M., Mulazzani, M., & Weippl, E. (2010). InnoDB Database Forensics. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52981 ( reposiTUm)
Anjomshoaa, A., Khue, V. S., Tjoa, A. M., Weippl, E., & Michael, H. (2010). Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case. In Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010) (pp. 180–189). Springer. http://hdl.handle.net/20.500.12708/52975 ( reposiTUm)
Ahmed, M., & Weippl, E. (2010). Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Workshop on Frontiers in Availability, Reliability and Security (FARES 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52979 ( reposiTUm)
Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems. In Proceedings of 10th IEEE International Conference on Advanced Learning Technologies (pp. 734–735). http://hdl.handle.net/20.500.12708/53736 ( reposiTUm)
Racz, N., Seufert, A., & Weippl, E. (2010). A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC). In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53520 ( reposiTUm)
Mulazzani, M., Huber, M., & Weippl, E. (2010). Tor HTTP usage and information leakage. In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53521 ( reposiTUm)
Weippl, E., Tjoa, A. M., Graf, S., & Farman, A. K. (2009). Integrated Approach for the Detection of Learning Styles & Affective States. In Proceedings of ED-MEDIA 2009 (pp. 753–761). http://hdl.handle.net/20.500.12708/52670 ( reposiTUm)
Weippl, E., & Schnabl, S. (2009). Screen Recording for E-Learning. In Proceedings of ED-MEDIA 2009 (pp. 1271–1277). http://hdl.handle.net/20.500.12708/52671 ( reposiTUm)
Kalchgruber, P., & Weippl, E. (2009). Can End-to-End Verifiable E-Voting be Explained Easily? In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), Workshop on Emerging Research Projects, Applications and Services (ERPAS2009). IIWAS, Austria. ACM Press. http://hdl.handle.net/20.500.12708/52980 ( reposiTUm)
Asfand-e-yar, M., Anjomshoaa, A., Weippl, E. R., & Tjoa, A. M. (2009). Blending the Sketched Use Case Scenario with License Agreements Using Semantics. In Knowledge Science, Engineering and Management (pp. 275–284). Springer, LNAI. https://doi.org/10.1007/978-3-642-10488-6_28 ( reposiTUm)
Farman, A. K., & Weippl, E. (2009). An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System. In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009). IIWAS, Austria. ACM. http://hdl.handle.net/20.500.12708/52977 ( reposiTUm)
Irani, M. T., & Weippl, E. R. (2009). Automation of Post-exploitation. In Security Technology (pp. 250–257). Springer LNCS. https://doi.org/10.1007/978-3-642-10847-1_31 ( reposiTUm)
Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69 ( reposiTUm)
Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160 ( reposiTUm)
Weippl, E. (2008). Chair’s Message. In Proceedings of the The Third International Conference on Availability, Security, and Reliability ARES 2008. IEEE Computer Society Press. https://doi.org/10.1109/ARES.2008.4 ( reposiTUm)
Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565 ( reposiTUm)
Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1 ( reposiTUm)
Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916 ( reposiTUm)
Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161 ( reposiTUm)
Weippl, E., Latif, K., & Tjoa, A. M. (2007). Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. In IEEE International Conference on Information Reuse and Integration (pp. 170–176). http://hdl.handle.net/20.500.12708/51807 ( reposiTUm)
Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164 ( reposiTUm)
Riedl, B., Goluch, G., Pöchlinger, S., & Weippl, E. (2007). Comparative Literature Review on RFID Security and Privacy. In Proceedings of the 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS 2007). 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS2007), Jarkata, Indonesien, Non-EU. Österreichische Computer Gesellschaft. http://hdl.handle.net/20.500.12708/51858 ( reposiTUm)
Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29 ( reposiTUm)
Neubauer, T., Weippl, E., & Biffl, S. (2006). Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. In First International Conference on Availability, Reliability and Security (ARES’06) (pp. 723–731). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51391 ( reposiTUm)
Weippl, E., & Fenz, S. (2006). Ontology-based IT-Security planning. In Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC’06) (pp. 389–390). http://hdl.handle.net/20.500.12708/51421 ( reposiTUm)
Weippl, E. (2006). Addressing the Weakest Link: How to improve teaching of IT security. In Proceedings of EDMEDIA 2006 (pp. 223–227). http://hdl.handle.net/20.500.12708/51422 ( reposiTUm)
Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423 ( reposiTUm)
Neubauer, T., & Weippl, E. (2006). Workshop-based Multiobjective Security Safeguard Selection. In Proceedings of ARES 2006. IEEE Computer Society, Vienna, Austria. http://hdl.handle.net/20.500.12708/51424 ( reposiTUm)
Weippl, E. (2006). Digitale PDF-Signaturen mit der Bürgerkarte. In Proceedings of D-A-CH 2006. D-A-CH 2006, Duesseldorf, EU. http://hdl.handle.net/20.500.12708/51426 ( reposiTUm)
Neubauer, T., Stummer, C., & Weippl, E. (2006). Workshop-based multiobjective security safeguard selection. In First International Conference on Availability, Reliability and Security (ARES’06). First International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria. IEEE Computer Society. https://doi.org/10.1109/ares.2006.144 ( reposiTUm)
Tjoa, A. M., Weippl, E., Klemen, M., Ekelhart, A., & Fenz, S. (2006). Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. In Proceedings of the 6th International Conference on Practical Aspects of Knowledge Management (pp. 37–48). Springer. http://hdl.handle.net/20.500.12708/176626 ( reposiTUm)
Weippl, E., & Goluch, G. (2006). Nichtabstreitbarkeit und Audits in ELearning. In IRIS 2006. IRIS, Salzburg, Austria, Austria. http://hdl.handle.net/20.500.12708/51425 ( reposiTUm)
Weippl, E. (2005). Non-repudiation and audits in e-learning. In Proceedings of E-Learn 2005 (pp. 1785–1790). http://hdl.handle.net/20.500.12708/51212 ( reposiTUm)
Weippl, E., Klemen, M., & Tjoa, A. M. (2005). Semantic storage: A report on performance and flexibility. In Proceedings of DEXA, LNCS (pp. 586–595). Springer. http://hdl.handle.net/20.500.12708/51213 ( reposiTUm)
Weippl, E. (2005). Dependability in e-assessment. In Proceedings of EDMEDIA 2005 (pp. 1674–1679). AACE. http://hdl.handle.net/20.500.12708/51215 ( reposiTUm)
Klemen, M., Weippl, E., & Tjoa, A. M. (2005). The semantic desktop: A semantic personal information management system based on rdf and topic maps. In In Proceedings the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB). ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Non-EU. ACM. http://hdl.handle.net/20.500.12708/51216 ( reposiTUm)
Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: How to implement anonymity. In Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC). International Workshop on e-Learning Online Communities - eLOC 2005, Cairo, Non-EU. IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/51217 ( reposiTUm)
Kalinyaprak, H., Futschek, G., Blaha, G., & Weippl, E. (2005). E-Learning without Text and Language: A Language-Free Learning Model. In ED-MEDIA 2005. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/51032 ( reposiTUm)
Gahleitner, E., Palkoska, J., & Weippl, E. (2005). On cooperatively creating dynamic ontologies. In Proceedings of the 16th ACM Conference on Hypertext and Hypermedia. Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, Salzburg, Austria. http://hdl.handle.net/20.500.12708/51214 ( reposiTUm)

Beiträge in Büchern

Stifter, N., Judmayer, A., & Weippl, E. (2019). Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30189 ( reposiTUm)
Brenner, B., & Weippl, E. (2019). Security Analysis. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30202 ( reposiTUm)
Kieseberg, P., & Weippl, E. (2019). Securing Information against Manipulation in the Production Systems Engineering Process. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30203 ( reposiTUm)
Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering (pp. 497–507). Springer International Publishing. https://doi.org/10.1007/978-3-030-25312-7_18 ( reposiTUm)
Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30184 ( reposiTUm)
Krieg, C., & Weippl, E. (2013). Malware in Hardware Infrastructure Components. In Advances in IT Early Warning. Fraunhofer IRB Verlag. http://hdl.handle.net/20.500.12708/28197 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Leithner, M., Mulazzani, M., Weippl, E., Munroe, L., & Sinha, M. (2012). Malicious Pixels: Using QR Codes as Attack Vector. In Trustworthy Ubiquitous Computing (pp. 21–38). Atlantic Press. http://hdl.handle.net/20.500.12708/27834 ( reposiTUm)
Böck, B., & Weippl, E. (2010). Social Engineering. In The Handbook of Technology Management. John Wiley & Sons Ltd. http://hdl.handle.net/20.500.12708/26599 ( reposiTUm)
Weippl, E. (2009). Security in Data Warehouses. In Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction (pp. 272–279). IGI Global. http://hdl.handle.net/20.500.12708/26598 ( reposiTUm)
Weippl, E., & Riedl, B. (2008). Security, Trust and Privacy on Mobile Devices and Multimedia Applications. In Handbook of Research on Mobile Multimedia, Second Edition (pp. 115–131). Information Science Reference. http://hdl.handle.net/20.500.12708/26600 ( reposiTUm)
Weippl, E., & Klemen, M. (2008). Improving Storage Concepts for Semantic Models and Ontologies. In The Semantic Web for Knowlege and Data Management: Technologies and Practices (pp. 38–48). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25370 ( reposiTUm)
Weippl, E. (2007). Database Security and Statistical Database Security. In J. Wang (Ed.), Encyclopedia of Data Warehousing and Mining. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25405 ( reposiTUm)
Klemen, M., & Weippl, E. (2007). Social Engineering. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25393 ( reposiTUm)
Klemen, M., Neubauer, T., & Weippl, E. (2007). Business Requirements of Backup Systems. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25394 ( reposiTUm)
Weippl, E. (2006). Computer Security in the Context of E-Learning. In Encyclopedia of E-Commerce, E-Government and Mobile Commerce (pp. 135–141). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25371 ( reposiTUm)
Weippl, E., & Klemen, M. (2006). Implementing IT Security for Small and Medium-Sized Enterprises. In Enterprise Information Systems Assurance and System Managerial and Technical Issues. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25386 ( reposiTUm)
Weippl, E. (2006). Securing Mobile Communication: RADIUS in a Windows Environment. In Mobile Multimedia: Communication Engineering Perspective (pp. 22–37). Nova Science Publishers. http://hdl.handle.net/20.500.12708/25385 ( reposiTUm)
Weippl, E. (2006). Security and Trust in Mobile Multimedia. In Handbook of Research on Mobile Multimedia (pp. 22–37). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25369 ( reposiTUm)
Weippl, E. (2005). Security in E-Learning. In The Handbook of Information Security. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25372 ( reposiTUm)

Bücher

Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. R. (Eds.). (2021). Machine Learning and Knowledge Extraction (Vol. 12844). Springer. https://doi.org/10.1007/978-3-030-84060-0 ( reposiTUm)
Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (Eds.). (2019). Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/24652 ( reposiTUm)
Tjoa, A. M., Weippl, E., Kieseberg, P., Holzinger, A., & Buccafurri, F. (Eds.). (2016). Availability, Reliability, and Security in Information Systems. Springer LNCS 9817. https://doi.org/10.1007/978-3-319-45507-5 ( reposiTUm)
Availability, Reliability, and Security in Information Systems. (2014). In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Lecture Notes in Computer Science. Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6 ( reposiTUm)
Avasilcai, S., Tjoa, A. M., Hutu, C. A., & Weippl, E. (Eds.). (2012). QMHE2012. OCG (Österreichische Computer Gesellschaft). http://hdl.handle.net/20.500.12708/23672 ( reposiTUm)
Weippl, E. (2005). Security in E-Learning. Springer. http://hdl.handle.net/20.500.12708/22294 ( reposiTUm)

Tagungsbände

Mustofa, K., Neuhold, E., Tjoa, A. M., Weippl, E., & You, I. (Eds.). (2013). Information and Communicatiaon Technology: Vol. LNCS 7804. Springer. https://doi.org/10.1007/978-3-642-36818-9 ( reposiTUm)
Weippl, E., & Luca, J. (Eds.). (2008). ED-MEDIA Conference Proceedings 2008. AACE. http://hdl.handle.net/20.500.12708/23011 ( reposiTUm)

Präsentationen

Dabrowski, A., Fejes, P., Ullrich, J., Krombholz, K., Hobel, H., & Weippl, E. (2014). Hardware Trojans - Detect and React? Network and Distributed System Security Symposium (NDSS), USA, Non-EU. http://hdl.handle.net/20.500.12708/86009 ( reposiTUm)
Mulazzani, M., Schrittwieser, S., Reschl, P., Leithner, M., Weippl, E., & Huber, M. (2013). Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. Web 2.0 Security & Privacy 2013, San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85714 ( reposiTUm)
Schrittwieser, S., Weippl, E., & Mulazzani, M. (2013). Ethics in Security Research - Which Lines Should Not Be Crossed? Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85712 ( reposiTUm)
Reschl, P., Mulazzani, M., Huber, M., & Weippl, E. (2011). Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/85219 ( reposiTUm)
Weippl, E. (2007). Forschung und Praxis der Informationssicherheit. University meets Public, Vienna, Austria. http://hdl.handle.net/20.500.12708/84576 ( reposiTUm)

Preprints

Ghesmati, S., Fdhila, W., & Weippl, E. (2022). User-Perceived Privacy in Blockchain. Cryptology ePrint Archive. ( reposiTUm)
Ghesmati, S., Fdhila, W., & Weippl, E. R. (2022). Usability of Cryptocurrency Wallets Providing CoinJoin Transactions. Cryptology ePrint Archive. https://doi.org/10.34726/3604 ( reposiTUm)

Spezialbeiträge

Weippl, E., & Klemen, M. (2004). Content-basierte Zugriffsrechte in E-Learning Systemen. ÖGAI Journal, 23(4), 24–29. http://hdl.handle.net/20.500.12708/174838 ( reposiTUm)

Hochschulschriften

Weippl, E. R. (2008). IT security in the context of e-learning [Professorial Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/182690 ( reposiTUm)